US10789214B2 - Providing access to resources - Google Patents
Providing access to resources Download PDFInfo
- Publication number
- US10789214B2 US10789214B2 US14/970,976 US201514970976A US10789214B2 US 10789214 B2 US10789214 B2 US 10789214B2 US 201514970976 A US201514970976 A US 201514970976A US 10789214 B2 US10789214 B2 US 10789214B2
- Authority
- US
- United States
- Prior art keywords
- storage resources
- backup
- source
- source storage
- metadata
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 31
- 238000004590 computer program Methods 0.000 claims abstract description 11
- 230000004044 response Effects 0.000 claims description 10
- 230000001360 synchronised effect Effects 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 238000011084 recovery Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/178—Techniques for file synchronisation in file systems
- G06F16/1794—Details of file format conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2069—Management of state, configuration or failover
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2071—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring using a plurality of controllers
Definitions
- Embodiments of the present disclosure relate to the field of disaster recovery.
- Example embodiments of the present disclosure provide a system, a computer program product and a method of providing an access to storage resources by receiving a user selection of one or more of a plurality of source storage resources; establishing corresponding backup storage resources for the selected one or more source storage resources.
- FIG. 1 illustrates a flowchart of a method 100 for providing an access to storage resources according to an exemplary embodiment of the present disclosure.
- FIG. 2 illustrates one example 200 for providing an access to storage resources according to an exemplary embodiment of the present disclosure.
- FIG. 3 illustrates a system 300 for providing an access to storage resources according to an exemplary embodiment of the present disclosure.
- FIG. 4 illustrates a schematic block diagram of a computer system 400 for implementing embodiments of the present disclosure.
- Embodiments of the present disclosure provide a system, a computer program product and a method of providing an access to storage resources by receiving a user selection of one or more of a plurality of source storage resources; establishing corresponding backup storage resources for the selected one or more source storage resources.
- a further embodiment may include in response to source storage resources in a selected one or more source storage resources being inaccessible, providing an access to a corresponding backup storage resources of a inaccessible source storage resources.
- An optional embodiment may include establishing metadata backup for metadata for a plurality of source storage resources.
- An optional embodiment may include providing an access to corresponding backup storage resources of inaccessible source storage resources by acquiring a metadata backup for inaccessible source storage resources.
- a further embodiment may include providing access based on an acquired metadata backup and backup storage resources of inaccessible source storage resources.
- An optional embodiment may include converting a format of an acquired metadata backup into a text format, A further embodiment may include converting metadata into a text format to metadata in a target format. A further embodiment may include providing access based on a metadata in a target format and backup storage resources of inaccessible source storage resources. An optional embodiment may include not establishing backup storage resources for source storage resources of a plurality of source storage resources not selected by the user. An optional embodiment may include, source storage resources and backup storage resources being located at different sites. An optional embodiment may include, storage resources being a file system.
- a further embodiment may provide a system of providing an access to storage resources.
- a further embodiment may include, a receiving unit configured to receive a user selection of one or more of a plurality of source storage resources.
- a further embodiment may include an establishing unit configured to establish corresponding backup storage resources for a selected one or more source storage resources.
- a further embodiment may include a resource access providing unit configured to, in response to source storage resources in a selected one or more source storage resources being inaccessible, provide an access to a corresponding backup storage resources of inaccessible source storage resources.
- An optional embodiment may include a metadata backup unit configured to establish metadata backup for metadata for a plurality of source storage resources.
- the resource access providing unit may be further configured to acquire the metadata backup for inaccessible source storage resources and provide access based on acquired metadata backup and backup storage resources of inaccessible source storage resources.
- An optional embodiment may include converting a format of an acquired metadata backup into a text format.
- a further embodiment may include converting a metadata in a text format into metadata in a target format.
- a further embodiment may include providing access based on a metadata in a target format and a backup storage resources of inaccessible source storage resources.
- the establishing unit may be further configured not to establish backup storage resources for source storage resources of a plurality of source storage resources not selected by a user.
- source storage resources and backup storage resources may be located at different sites.
- storage resources may be a file system.
- a computer program product comprising computer readable program instructions embodied therein, the computer readable program instructions when executed by a processing unit, perform the method of present disclosure disclosed above.
- An advantage embodiment according to the present disclosure may save resources and perform disaster recovery quickly and flexibly upon occurrence of a disaster, and keep transparency to a user during the entire process.
- FIG. 1 illustrates a flowchart of a method 100 for providing an access to storage resources according to an exemplary embodiment of the present disclosure.
- the storage resources herein may comprise various types of storage resources, and typically may comprise a file system.
- the present disclosure is not limited to this, i.e., any other types of storage resources all fall within the concept of the present disclosure.
- step S 101 receives a user selection of one or more of a plurality of source storage resources.
- Step S 101 makes it possible to treat the storage resources that are interesting or relatively important for the user differently while backing up the source storage resources.
- the method 100 proceeds to step S 102 of establishing corresponding backup storage resource for the selected one or more source storage resources.
- step S 103 of, in response to the source storage resources in the selected one or more source storage resources being inaccessible, providing an access to the corresponding backup storage resources of the inaccessible source storage resources.
- source storage resource used here may be relative to “backup storage resource” mentioned later, and the “source storage resource” may mainly refers to a resource originally used to provide an access for a user.
- a source storage resource may be stored in the form for example of a LUN (Logical Unit Number).
- LUN Logical Unit Number
- those skilled in the art may appreciate that the importance of storage resources usually varies for a user. In some other embodiments, sometimes, a user might be only interested in a part of storage resources and seldom utilize remaining storage resources.
- source storage resources and backup storage resources may be located at different sites, e.g., a source site and a target site.
- backup storage resources may be established by mirroring one or more source storage resources at a source site to a target site.
- when a disaster occurs at source storage resources at a source site it may be possible that the access to resources will be provided via backup storage resources stored in a target site.
- real-time synchronous updating may be generally used to keep backup storage resources consistent with source storage resources to the extent possible.
- an operation such as reading, writing or updating may be performed for selected source storage resources, a similar operation may be performed for backup storage resources in a real-time and synchronous manner.
- backup since backup has been established for source storage resources, access to source storage resources may be provided based on a corresponding backup storage resources. Those skilled in the art may appreciate that in some exemplary embodiments of the present disclosure, backup may not be established for those source storage resources of a plurality of source storage resources not selected by a user to further save resources.
- method 100 may further selectively comprise a step of establishing metadata backup for a metadata for a plurality of source storage resources.
- metadata as description information for backup resources, may comprise storage volume structure, configuration information of user access authority and the like in the context.
- metadata may be stored in a form of a specific storage unit such as control LUN.
- the step of establishing backup for metadata may be performed at any possible timing of method 100 . In an example embodiment, it may be performed before or after step S 101 , but the present disclosure may not be limited to this.
- an exemplary implementation may perform step (1) of acquiring a metadata backup for inaccessible source storage resources; and step (2) of providing access to backup storage resources corresponding to inaccessible source storage resources based on an acquired metadata backup and backup storage resources of inaccessible source storage resources.
- the step (2) of basing on an acquired metadata backup and backup storage resources of inaccessible source storage resources may be implemented by the following steps:
- method 100 performs backup only for resources selected by a user so that less time may be consumed during disaster recovery, and the operation may become more flexible.
- a dedicated storage area need not be allocated for backup resources at a target site where backup resources may be located, which facilitates a reduction in waste of resources.
- FIG. 2 illustrates example 200 for providing an access to storage resources according to an exemplary embodiment of the present disclosure.
- example 200 is presented only for illustrative purpose, it might cover a more detailed embodiment, but it cannot be regarded as limiting aspects of the present disclosure.
- source storage resources 203 - 208 are stored in source site 201 for example in the form of LUN, and meanwhile corresponding metadata 202 are also stored in source site 201 .
- metadata 202 may be first mirrored to target site 201 ′ during initialization process to form backup metadata 202 ′.
- source site 201 and target site 201 ′ are different sites.
- backup is performed only for source storage resources 203 - 205 selected by the user on target site 201 ′ to form backup source storage resources 203 ′- 205 ′, and no backup is performed for source storage resources 206 - 208 that are not selected by the user.
- system 300 for providing an access to storage resources according to an exemplary embodiment of the present disclosure as depicted in FIG. 3 .
- system 300 comprises receiving unit 301 , establishing unit 302 and resource access providing unit 303 .
- Receiving unit 301 is configured to receive a user selection of one or more of a plurality of source storage resources.
- Establishing unit 302 is configured to establish corresponding backup storage resources for the selected one or more source storage resources.
- Resource access providing unit 303 is configured to, in response to the source storage resources in the selected one or more source storage resources being inaccessible, provide an access to the corresponding backup storage resources of the inaccessible source storage resources.
- system 300 may include a metadata backup unit configured to establish metadata backup for the metadata for a plurality of source storage resources.
- resource access providing unit 303 may be further configured to acquire a metadata backup for inaccessible source storage resources and provide access based on acquired metadata backup and backup storage resources of inaccessible source storage resources.
- providing access based on acquired metadata backup and backup storage resources of inaccessible source storage resources may include converting a format of acquired metadata backup into a text format.
- a further embodiment may include converting a metadata in a text format to metadata into a target format.
- a further embodiment may include providing access based on a metadata in a target format and a backup storage resources of inaccessible source storage resources.
- establishing unit 302 may be further configured not to establish backup storage resources for source storage resources of a plurality of source storage resources not selected by the user.
- source storage resources and backup storage resources may be located at different sites.
- storage resources may be a file system.
- a module may replace all units and perform the tasks of each of these units disclosed above.
- FIG. 4 illustrates a schematic block diagram of computer system 400 used to implement an embodiment of the present disclosure.
- computer system 400 shown in FIG. 4 may be used to implement components of system 300 for providing access to storage resources as depicted above, and also used to solidify or implement each step of method 100 for providing the access to storage resources as depicted above.
- computer system 400 may include CPU (Central Processing Unit) 401 , RAM (Random Access Memory) 402 , ROM (Read Only Memory) 403 , system bus 404 , hard disk controller 405 , keyboard controller 406 , serial interface controller 407 , parallel interface controller 408 , display controller 409 , hard disk 410 , keyboard 411 , serial peripheral device 412 , parallel peripheral device 413 and display 414 .
- components coupled to system bus 404 are CPU 401 , RAM 402 , the ROM 403 , hard disk controller 405 , keyboard controller 406 , serial interface controller 407 , parallel interface controller 408 and display controller 409 .
- Hard disk 410 is coupled to hard disk controller 405 ; keyboard 411 is coupled to keyboard controller 406 ; serial peripheral device 412 is coupled to serial interface controller 407 ; parallel peripheral device 413 is coupled to parallel interface controller 408 ; and display 414 is coupled to display controller 409 .
- FIG. 4 the structural block diagram in FIG. 4 is shown only for illustration purpose, and is not intended to limit the scope of the present disclosure. In some cases, some devices may be added or removed, which depends on specific situations.
- system 300 may be implemented as a hardware, e.g., a chip, ASIC, SOC or the like.
- This hardware may be integrated in computer system 400 .
- embodiments of the present disclosure may be implemented in the manner of a computer program product.
- method 100 as described with reference to FIG. 1 may be implemented by a computer program product.
- This computer program product may be stored in RAM 402 , ROM 403 , hard disk 410 as illustrated in FIG. 4 and/or any suitable storage medium, or downloaded to the computer system 400 from a suitable location in the network.
- the computer program product may comprise a computer code portion comprising program instructions executed by a suitable processing device (for example, CPU 401 in FIG. 4 ).
- the program instructions may at least comprise instructions for implementing steps of method 100 .
- These program instructions may at least comprise an instruction for receiving a user selection of one or more of a plurality of source storage resources, and an instruction for establishing corresponding backup storage resource for the selected one or more source storage resources.
- These program instructions further comprise an instruction for, in response to the source storage resources in the selected one or more source storage resources being inaccessible, providing an access to the corresponding backup storage resources of the inaccessible source storage resources.
- the preceding text has already illustrated the spirit and principles of the present disclosure in conjunction with several embodiments.
- the method and system for providing the access to storage resources according to the present disclosure have many advantages over the prior art.
- the present disclosure supports fine-granularity resource backup by providing a suitable method and system.
- Embodiments provided by the present disclosure may save resources and perform disaster recovery quickly and flexibly upon occurrence of the disaster, and keep transparency to the user during the whole procedure.
- embodiments of the present disclosure may be implemented in software, hardware or the combination thereof.
- the hardware part may be implemented by a special logic; the software part may be stored in a memory and executed by a proper instruction execution system such as a microprocessor or a design-specific hardware.
- a proper instruction execution system such as a microprocessor or a design-specific hardware.
- Those skilled in the art may understand that the above method and system may be implemented by a computer-executable instruction and/or in a processor controlled code, for example, such code may be provided on a carrier medium such as a magnetic disk, CD, or DVD-ROM, or a programmable memory such as a read-only memory (firmware) or a data carrier such as an optical or electronic signal carrier.
- the apparatuses and their modules in the present disclosure may be implemented by a very large scale integrated circuit or gate array, a semiconductor such as logical chip or transistor, or hardware circuitry of a programmable hardware device such as a field-programmable gate array, or a programmable logical device, or implemented by software executed by various kinds of processors, or implemented by combination of the above hardware circuitry and software, such as firmware.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- (2-1) converting a format of an acquired metadata backup into a text format, e.g., a plain text format. As a text format is independent of a platform, and thus conversion of a metadata between different formats may be quickly achieved by a text format as a medium, which is easily operable.
- (2-2) converting metadata in a text format into metadata in a target format. It should be appreciated that in the case that source storage resources and backup storage resources may be located at different sites, a target format may be a metadata format supported by a target site according to an exemplary embodiment of the present disclosure.
- (2-3) providing access based on a metadata of a target format and backup storage resources of inaccessible source storage resources. Since a metadata and storage resources are all available at a target site at this time, a corresponding service may be provided to a user based on both of them.
Claims (10)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510004779.9 | 2015-01-04 | ||
CN201510004779 | 2015-01-04 | ||
CN201510004779.9A CN105893170A (en) | 2015-01-04 | 2015-01-04 | Method and system for providing resource access |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160196183A1 US20160196183A1 (en) | 2016-07-07 |
US10789214B2 true US10789214B2 (en) | 2020-09-29 |
Family
ID=56286592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/970,976 Active 2037-05-24 US10789214B2 (en) | 2015-01-04 | 2015-12-16 | Providing access to resources |
Country Status (2)
Country | Link |
---|---|
US (1) | US10789214B2 (en) |
CN (2) | CN105893170A (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3528122A1 (en) * | 2018-02-15 | 2019-08-21 | Wipro Limited | Method and system for restoring historic data of an enterprise |
CN114968667B (en) * | 2022-05-30 | 2023-07-25 | 安超云软件有限公司 | Backup management method and system |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5893919A (en) | 1996-09-27 | 1999-04-13 | Storage Computer Corporation | Apparatus and method for storing data with selectable data protection using mirroring and selectable parity inhibition |
US20060218207A1 (en) * | 2005-03-24 | 2006-09-28 | Yusuke Nonaka | Control technology for storage system |
US7281032B2 (en) | 2000-06-30 | 2007-10-09 | Hitachi, Ltd. | File sharing system with data mirroring by storage systems |
CN101201765A (en) | 2006-12-13 | 2008-06-18 | 深圳市朗科科技有限公司 | Device and method for data backup |
US20100036931A1 (en) * | 2008-08-08 | 2010-02-11 | Tate Andrew Certain | Providing a reliable backing store for block data storage |
CN101916293A (en) | 2010-08-27 | 2010-12-15 | 中国电信股份有限公司 | Method and device for introducing media information into file |
US8155118B2 (en) | 2005-08-19 | 2012-04-10 | Hewlett-Packard Development Company, L.P. | Mirroring of a random subset of network traffic |
US8527471B2 (en) | 2010-12-27 | 2013-09-03 | Sap Ag | Shadow system mirroring of an original system during uptime of an upgrade process |
US20130282658A1 (en) * | 2012-04-23 | 2013-10-24 | Google, Inc. | Sharing and synchronizing electronically stored files |
CN103544081A (en) | 2013-10-23 | 2014-01-29 | 曙光信息产业(北京)有限公司 | Management method and device for double metadata servers |
US20140195480A1 (en) * | 2010-12-13 | 2014-07-10 | Fusion-Io, Inc. | Persistent memory management |
US20140201142A1 (en) * | 2013-01-14 | 2014-07-17 | Commvault Systems, Inc. | Partial sharing of secondary storage files in a data storage system |
US20150310188A1 (en) * | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
US9811431B1 (en) * | 2011-03-31 | 2017-11-07 | EMC IP Holding Company LLC | Networked based replication of distributed volumes |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080140944A1 (en) * | 2006-12-12 | 2008-06-12 | Hitachi, Ltd. | Method and apparatus for storage resource management in plural data centers |
US8028141B2 (en) * | 2008-06-03 | 2011-09-27 | International Business Machines Corporation | Partitioning of a multiple logic-unit-number SCSI target |
US8326804B2 (en) * | 2008-06-06 | 2012-12-04 | Symantec Corporation | Controlling resource allocation for backup operations |
CN103036930B (en) * | 2011-09-30 | 2015-06-03 | 国际商业机器公司 | Method and equipment used for managing storage devices |
-
2015
- 2015-01-04 CN CN201510004779.9A patent/CN105893170A/en active Pending
- 2015-01-04 CN CN202111048489.6A patent/CN113742139A/en active Pending
- 2015-12-16 US US14/970,976 patent/US10789214B2/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5893919A (en) | 1996-09-27 | 1999-04-13 | Storage Computer Corporation | Apparatus and method for storing data with selectable data protection using mirroring and selectable parity inhibition |
US7281032B2 (en) | 2000-06-30 | 2007-10-09 | Hitachi, Ltd. | File sharing system with data mirroring by storage systems |
US20060218207A1 (en) * | 2005-03-24 | 2006-09-28 | Yusuke Nonaka | Control technology for storage system |
US8155118B2 (en) | 2005-08-19 | 2012-04-10 | Hewlett-Packard Development Company, L.P. | Mirroring of a random subset of network traffic |
CN101201765A (en) | 2006-12-13 | 2008-06-18 | 深圳市朗科科技有限公司 | Device and method for data backup |
US20100036931A1 (en) * | 2008-08-08 | 2010-02-11 | Tate Andrew Certain | Providing a reliable backing store for block data storage |
CN101916293A (en) | 2010-08-27 | 2010-12-15 | 中国电信股份有限公司 | Method and device for introducing media information into file |
US20140195480A1 (en) * | 2010-12-13 | 2014-07-10 | Fusion-Io, Inc. | Persistent memory management |
US8527471B2 (en) | 2010-12-27 | 2013-09-03 | Sap Ag | Shadow system mirroring of an original system during uptime of an upgrade process |
US9811431B1 (en) * | 2011-03-31 | 2017-11-07 | EMC IP Holding Company LLC | Networked based replication of distributed volumes |
US20130282658A1 (en) * | 2012-04-23 | 2013-10-24 | Google, Inc. | Sharing and synchronizing electronically stored files |
US20140201142A1 (en) * | 2013-01-14 | 2014-07-17 | Commvault Systems, Inc. | Partial sharing of secondary storage files in a data storage system |
CN103544081A (en) | 2013-10-23 | 2014-01-29 | 曙光信息产业(北京)有限公司 | Management method and device for double metadata servers |
US20150310188A1 (en) * | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systems and methods of secure data exchange |
Also Published As
Publication number | Publication date |
---|---|
CN113742139A (en) | 2021-12-03 |
US20160196183A1 (en) | 2016-07-07 |
CN105893170A (en) | 2016-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102340223B1 (en) | Blockchain consensus method and device | |
US10719400B2 (en) | System and method for self-healing basic input/output system boot image and secure recovery | |
US8468334B1 (en) | Efficient initial RAM disk creation | |
US20070239965A1 (en) | Inter-partition communication | |
US8924701B2 (en) | Apparatus and method for generating a boot image that is adjustable in size by selecting processes according to an optimization level to be written to the boot image | |
US10289339B2 (en) | System and method for storing modified data to an NVDIMM during a save operation | |
US9983987B2 (en) | Method, apparatus, and device for locating a software failure | |
CN104461698A (en) | Dynamic virtual disk mounting method, virtual disk management device and distributed storage system | |
US20120324161A1 (en) | Electronic device and method for performing data backup and recovery | |
CN102799483A (en) | Method and device for converting runtime environments of operating system | |
CN109597678A (en) | Task processing method and device | |
US20160328334A1 (en) | Configuration of standby portion of memory based on context | |
CN115098866A (en) | Method for detecting private data leakage | |
US10789214B2 (en) | Providing access to resources | |
EP2869189A1 (en) | Boot up of a multiprocessor computer | |
CN108647112B (en) | Data backup method and device and distributed transaction processing system | |
US20130247037A1 (en) | Control computer and method for integrating available computing resources of physical machines | |
CN108255527A (en) | The method and apparatus of activation system, computing device, readable storage medium storing program for executing | |
US11119650B2 (en) | Information handling system with a user defined touch area and user defined display area on a horizontal work surface | |
US10498604B2 (en) | Capability determination for computing resource allocation | |
CN107704340B (en) | PE mirror image file generation method and device and electronic equipment | |
US11340949B2 (en) | Method and node for managing a request for hardware acceleration by means of an accelerator device | |
US20180095975A1 (en) | Managing file formats | |
US20220350636A1 (en) | Processing unit and processing system | |
US8571846B2 (en) | Electronic device and method of generating composite electrical signals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LU, YIFENG;WU, YUANYANG;XIONG, BRIAN TIANFANG;AND OTHERS;REEL/FRAME:037305/0114 Effective date: 20151211 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 |
|
AS | Assignment |
Owner name: EMC IP HOLDING COMPANY LLC, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMC CORPORATION;REEL/FRAME:040203/0001 Effective date: 20160906 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MOZY, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MAGINATICS LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL INTERNATIONAL, L.L.C., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: AVENTAIL LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |